
Tales from the SOC: Classic Crypto – Operation GUNMAN | S1 Ep023
Cold War cryptographic capers in a real-world Spy vs. Spy scenario!
By subscribing you agree to our Privacy Policy and provide consent to receive updates from our company.

Seasonal fun – with a gently serious side.

“The report of my death was an exaggeration.”


How do you keep software engineering safe and secure? How you do stop the endless upselling? Do you *really* need those heated seats?

‘Tis the season… for Threat Reports, Cybersecurity Predictions, State of XYZ Reviews, and all the rest!

Hackers are no longer just external threats—they’re increasingly acting as insider threats by exploiting identities rather than simply targeting endpoint devices.

If automated tools let more than 1 in 4 fake LinkedIn account registrations through, what can we humans do to help close the security gap?

Ransomware remains a major threat, but its methods have evolved significantly in recent years, becoming even more dangerous.

It’s midnight.
Do you know where your personal data is?

Don’t let your Black Friday precautions evaporate on Saturday!

If your phone is stolen while it’s unlocked, you could end up worrying about way more than the value of the phone…

How many strudels do you need in your password? Why does MVP refer to a sports player who is the best in the team, but to software that wouldn’t even make it into the squad?


Organizations are becoming more aware of the need for MDR (managed detection and response) services to achieve real cyber resiliency. The increase in the quantity and sophistication of cyberattacks means that other, siloed solutions, fall short of fully protecting your organization. Whereas no one can guarantee that you won’t fall victim to a cyberattack, the use of MDR significantly decreases that risk and its overall impact. Implementing MDR also gives you the greatest chance of effectively and rapidly recovering from […]

Many legitimate tools, from programming libraries to adversary simulators, can directly be used either for good or for bad. What to do?

As cyber threats became more evolved and sophisticated, the cybersecurity industry responded by developing more complex technologies. These technologies included the ability to detect intrusions through behavioral analysis, as well as advanced technologies for determining patterns from numerous data sources that indicate a compromise or that an unauthorized user is lurking in an organization’s network. Each advancement improved the ability of cybersecurity professionals to combat cyber threats, but it also started siloing cybersecurity solutions. Eventually, multiple technologies and tools existed […]

Seasonal fun – with a gently serious side.

“The report of my death was an exaggeration.”

How do you keep software engineering safe and secure? How you do stop the endless upselling? Do you *really* need those heated seats?
By subscribing you agree to our Privacy Policy and provide consent to receive updates from our company.

‘Tis the season… for Threat Reports, Cybersecurity Predictions, State of XYZ Reviews, and all the rest!

Hackers are no longer just external threats—they’re increasingly acting as insider threats by exploiting identities rather than simply targeting endpoint devices.

If automated tools let more than 1 in 4 fake LinkedIn account registrations through, what can we humans do to help close the security gap?


Ransomware remains a major threat, but its methods have evolved significantly in recent years, becoming even more dangerous.




How many strudels do you need in your password? Why does MVP refer to a sports player who is the best in the team, but to software that wouldn’t even make it into the squad?

Organizations are becoming more aware of the need for MDR (managed detection and response) services to achieve real cyber resiliency. The increase in the quantity and sophistication of cyberattacks means that other, siloed solutions, fall short of fully protecting your organization. Whereas no one can guarantee that you won’t fall victim to a cyberattack, the use of MDR significantly decreases that risk and its overall impact. Implementing MDR also gives you the greatest chance of effectively and rapidly recovering from […]

Many legitimate tools, from programming libraries to adversary simulators, can directly be used either for good or for bad. What to do?

As cyber threats became more evolved and sophisticated, the cybersecurity industry responded by developing more complex technologies. These technologies included the ability to detect intrusions through behavioral analysis, as well as advanced technologies for determining patterns from numerous data sources that indicate a compromise or that an unauthorized user is lurking in an organization’s network. Each advancement improved the ability of cybersecurity professionals to combat cyber threats, but it also started siloing cybersecurity solutions. Eventually, multiple technologies and tools existed […]


By subscribing you agree to our Privacy Policy and provide consent to receive updates from our company.






